QakBot Malware Hunting
QakBot Malware Hunting
0 / 26-02-2022
Hunting Recent
QakBot Malware
Zayed AlJaberi
26- 02 - 2022
https://www.linkedin.com/in/zayedaljaberi
OVERVIEW QAKBOT
A global view of QAKBOT activity from March 25, 2021 to October 25, 2021 as seen from Trend Micro Smart Protection Network (SPN)
Many other threat intelligence advisories and reports have shared hundreds of IOCs related to the
recent QakBot Campaign. However, the ongoing increase of the IOCs will make it hard for
the cyber security team in an enterprise to keep track and block all of them. We find this cannot be practical
anymore.
Coming across several advisories, we can see that this campaign uses specific TTPs that we can follow
and leverage in our environment to take a proactive approach and more efficient security in place.
This report will cover only the first four techniques of the malware stages of recent QakBot Malware,
mapping it with MITRE ATT&CK and hunting queries on Microsoft Defender ATP.
I have also added hunting queries of previous TTPs mentioned in the red canary threat report 2021
related to QakBot Malware to have better coverage in our detection for this exercise.
QAKBOT DELIVERY
EMAIL DELIVERY
Qakbot is delivered via one of three email methods: malicious links, malicious attachments, or, more
recently, embedded images. The links used have been categorized as; ; compromised sites, file share
sites, or newly seen domains.
Earlier this year, we began to observe abuse of OneDrive and mail with un/clickable links to download
the malicious Excel document.
Screenshot from Microsoft Security Blog
USER EXECUTION
Once the user visits the malicious site, a zip (contain .xlsb) or direct xlsb file will be downloaded. We
have analyzed several numbers of QakBot and we can observe they used a common filename pattern
e.g., MJ-1005546.xlsb.
Screenshot from AnyRun
DEFENSE EVASION
This technique is observed once the user clicks on "Enable Content", in this report we are cover the
spawn of Regsrv32. two types of files being created *.ocx or *.test. Gratefully, these files have pattern in
common is first numeric in each file (e.g. tel1.ocx, tel2.ocx, tel3.ocx) or (tel.test, tel1.test, tel2.test).
Summary
In conclusion, this report has focused on the first four techniques currently being used, with proper data sources
of the logs ingested and parsed correctly. Building use-case or custom detection will be partially enough to
detect and mitigate this risk. We should be aware that TTPs might be changed during the coming time.
IOC Collection
URLHaus
https://urlhaus.abuse.ch/browse/tag/qbot/
https://urlhaus.abuse.ch/browse/tag/Quakbot/
https://urlhaus.abuse.ch/browse/tag/Qakbot/
Github - executemalware
https://github.com/executemalware/Malware-IOCs
Reference
Sans DFIR Threat Hunting Summit - Hunting Malicious Office Macros
https://youtu.be/soF5iyeeWDg
UNIVERSAL RULE CONVERTER FOR VARIOUS SIEM, EDR, AND NTDR FORMATS
https://uncoder.io/
Cybereason - THREAT ANALYSIS REPORT: All Paths Lead to Cobalt Strike - IcedID, Emotet and QBot
https://www.cybereason.com/blog/threat-analysis-report-all-paths-lead-to-cobalt-strike-icedid-emotet-and-qbot
Microsoft - A closer look at Qakbot’s latest building blocks (and how to knock them down)
https://www.microsoft.com/security/blog/2021/12/09/a-closer-look-at-qakbots-latest-building-blocks-and-how-
to-knock-them-down/
The Prelude to Ransomware: A Look into Current QAKBOT Capabilities and Global Activities
https://documents.trendmicro.com/assets/pdf/Technical-Brief---The-Prelude-to-Ransomware-A-Look-into-
Current-QAKBOT-Capabilities-and-Activity.pdf